First published: Thu Jul 16 2020(Updated: )
A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Mc Works32 | =9.50.255.02 | |
Mitsubishielectric Mc Works64 | <=10.95.208.31 | |
Iconics Energy Analytix | ||
Iconics Facility Analytix | ||
ICONICS GENESIS64 | ||
ICONICS Hyper Historian | ||
ICONICS MobileHMI | ||
Iconics Quality Analytix | ||
Iconics Smart Energy Analytix | ||
ICONICS BizViz | ||
ICONICS GENESIS32 | ||
ICONICS GENESIS64 | ||
ICONICS Hyper Historian | ||
ICONICS AnalytiX | ||
ICONICS MobileHMI | ||
Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions | ||
Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12013 is a vulnerability that allows for the execution of certain arbitrary SQL commands on Mitsubishi Electric MC Works64 Version 4.02C and earlier, and Mitsubishi Electric MC Works32 Version 3.00A.
CVE-2020-12013 has a severity rating of 9.1 (critical).
CVE-2020-12013 affects Mitsubishi Electric MC Works64 Version 4.02C and earlier, and Mitsubishi Electric MC Works32 Version 3.00A.
At the moment, there are no known fixes for CVE-2020-12013. It is recommended to follow the guidance provided by the software vendor or CERT/CSIRT.
You can find more information about CVE-2020-12013 on the official website of CERT/CSIRT.